메뉴 건너뛰기




Volumn 9, Issue 1, 2005, Pages 93-95

Security analysis and improvement of the efficient password-based authentication protocol

Author keywords

Authentication protocol; Information security; Security analysis

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; SECURITY OF DATA; SERVERS; THEOREM PROVING;

EID: 12544254099     PISSN: 10897798     EISSN: None     Source Type: Journal    
DOI: 10.1109/LCOMM.2005.01032     Document Type: Article
Times cited : (14)

References (11)
  • 1
    • 0026850091 scopus 로고
    • "Encrypted key exchange: Password-based protocols secure against dictionary attacks"
    • S. Bellovin and M. Merritt, "Encrypted key exchange: password-based protocols secure against dictionary attacks," in IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992.
    • (1992) IEEE Symposium on Research in Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 2
    • 0027741529 scopus 로고
    • "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise"
    • S. Bellovin and M. Merritt, "Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise," in ACM Conference on Computer and Communications Security, pp, 244-250, 1993.
    • (1993) ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 3
    • 0002970951 scopus 로고    scopus 로고
    • "The Decision Diffie-Hellman Problem"
    • ANTS-III, Lecture Notes in Computer Science (1423), Springer-Veralg, Portland, USA
    • D. Boneh, "The Decision Diffie-Hellman Problem," ANTS-III, Lecture Notes in Computer Science (1423), Springer-Veralg, Portland, USA, June 1998.
    • (1998)
    • Boneh, D.1
  • 4
    • 26844522740 scopus 로고    scopus 로고
    • "EPA: An efficient password-based protocol for authenticated key exchange"
    • ACISP, Lecture Notes in Computer Science (2727), Springer-Veralg, Wollongong, Austrialia, July
    • Y. Hwang, D. Yum, and P. Lee, "EPA: an efficient password-based protocol for authenticated key exchange," ACISP, Lecture Notes in Computer Science (2727), Springer-Veralg, Wollongong, Austrialia, July 2003.
    • (2003)
    • Hwang, Y.1    Yum, D.2    Lee, P.3
  • 5
    • 18744364016 scopus 로고    scopus 로고
    • Password-Based Public-Key Cryptography
    • IEEE P1363.2, and http://grouper.ieee.org/groups/1363/passwdPK /contributions.html
    • IEEE P1363.2, Password-Based Public-Key Cryptography, http:// grouper.ieee.org/groups/1363/passwdPK/index.html and http:// grouper.ieee.org/groups/1363/passwdPK/contributions.html
  • 6
    • 0030261758 scopus 로고    scopus 로고
    • "Strong password-only authenticated key exchange"
    • May
    • D. Jablon, "Strong password-only authenticated key exchange," ACM Computer Communications Review, vol. 26, pp. 5-26, May 1996.
    • (1996) ACM Computer Communications Review , vol.26 , pp. 5-26
    • Jablon, D.1
  • 9
    • 12544256011 scopus 로고    scopus 로고
    • "The PAK Suite: Protocols for Password-Authenticated Key Exchange"
    • submission to IEEE P1363.2, Apr
    • P. MacKenzie, "The PAK Suite: Protocols for Password-Authenticated Key Exchange," submission to IEEE P1363.2, Apr. 2002.
    • (2002)
    • Mackenzie, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.